FREE BUDGET SHIPPING

GET FREE BUDGET SHIPPING ON QUALIFIED ITEMS WHERE YOU SEE THIS ICON: 

Many items at BargainStation.com offer FREE Budget Shipping. Plus, as with many of our competitors which do offer free shipping, we don't ask you to spend a specified amount in order to qualify for FREE Budget Shipping.

How do I qualify for FREE Budget Shipping?

1. Add the item(s) that qualifies for FREE Budget Shipping to your order’s shopping cart.

2. If a product has this icon: that product will qualify for FREE Budget Shipping regardless of its price.

3. Proceed to checkout and select Budget Shipping as your shipping option (items will take an additional 7-10 business days to ship).

4. Ship your item(s) to a valid U.S. address.

5. Then, complete your order. It's that simple!

FREE Budget Shipping excludes certain oversized and/or overweight items, and those products that do not include this icon:


Some items may be excluded:

If certain items in your shopping cart are not eligible for Budget Shipping then Budget Shipping will not be available and thus the offer for FREE Budget Shipping will not apply.

FREE Budget Shipping is not available for International orders.

Checkout | 0 Items - $0.00
Your Shopping Cart is empty

Aruba IntroSpect 2000 Network Security/Firewall Appliance JZ263A

Aruba IntroSpect 2000 Network Security/Firewall Appliance JZ263A
  • Item #:
  • Category:
  • Availability:
  • Packaging:
  • Platform:
  • Condition:
  • Brand:

Your Price: $91858.97
Qty:
Product Rating

0 star(s) (0 Ratings) Write a Review


General Information
USER AND ENTITY BEHAVIOR ANALYTICS

Aruba's User and Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect, detects attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses. Aruba IntroSpect integrates advanced AI-based machine learning (ML), pinpoint visualizations and instant forensic insight into a single solution, so attacks involving malicious, compromised or negligent users, systems and devices are found and remediated before they damage the operations and reputation of the organization.

With a Spark/Hadoop platform, IntroSpect uniquely integrates both behavior-based attack detection and forensically-rich incident investigation and response at enterprise scale.

WHAT WE DETECT: SECURITY ANALYTICS USE CASES

IntroSpect provides 100+ supervised and unsupervised machine learning models focused on detecting targeted attacks at each stage of the kill chain:
  • Account Abuse
  • Account Takeover
  • Command and Control
  • Data Exfiltration
  • Lateral Movement
  • Password Sharing
  • Privilege Escalation
  • Flight Risk
  • Phishing
  • Ransomware
ACCELERATED INVESTIGATION & RESPONSE

From SysAdmins to Systems to Sensors - Providing Instant Visibility

IntroSpect Entity360 is key to reducing the time and effort required to understand, diagnose and respond to an attack. Entity360 provides a comprehensive security profile with continuous risk scoring and enriched security information - analysts would otherwise spend hours or days searching for and compiling months and years of security data down to the packet level. Entity360 provides:
  • Profiles for users, systems and devices
  • Access by SIEM, NAC systems, etc. via an open API
  • Pre-packaged incident response playbooks
  • Customer-measured 30 hours/investigation savings
  • Automatic detection of other entities impacted by the attack
THREAT HUNTING

Proactive threat hunting is easily accomplished with a powerful query interface, without the overhead of finding, searching, and summarizing isolated data stores.
  • Rich analytics to test threat hypotheses across any timeframe
  • Automated search of historical data using IOC's from STIX and custom threat feeds
  • Visualizations to highlight anomalies and significant interactions
  • Significant activity monitored and tagged to assist with both hunting and investigations
DATA SOURCES

The IntroSpect platform processes the broadest range of data sources, including:
  • VPN, FW, IPS/IDS, Web proxy, Email logs
  • NetFlow
  • Packets
  • DNS logs
  • Active Directory logs
  • DHCP logs
  • External threat feeds
  • Alerts from 3rd party security infrastructure
DEPLOYMENT OPTIONS
  • On-premise VM or appliance for Packet Processor
  • AWS or on-premise deployment for Analyzer

KEY INTEGRATIONS

  • ArcSight
  • Aruba ClearPass
  • Blue Coat
  • Checkpoint
  • Cisco
  • FireEye
  • Forcepoint
  • Fortinet
  • Gigamon
  • IBM QRadar
  • Infoblox
  • IXIA
  • Juniper
  • McAfee (as in proxy server)
  • Microsoft
  • Palo Alto Networks
  • Splunk

Technical Information
Firewall Protection Supported:Network Attack Detection
Firewall Protection Supported:Anti-phishing
Firewall Protection Supported:Threat Protection

Management & Protocols
Manageable:Yes

Warranty
Support/Service Duration:1 Year

Be the first to review this product. Write a Review
Shipping Restrictions
  • This item cannot be shipped to PO Boxes.
  • This item can be shipped only within the U.S.

Special Order Item

This item ships directly from the manufacturer and is not stocked in our warehouse. If stock is available at the manufacturer, the item will ship directly to you, usually within 7 - 15 business days.

Once the order has been sent to the manufacturer it can no longer be canceled.

If payment is made via credit card it will be charged before the order is sent to the manufacturer.

You must contact the manufacturer directly regarding returns and defective items.

We will contact you by email if the item is sold out or backordered (and we were unable to update the site before you placed the order) or if the item will be delayed longer than expected.

We have no control over the speed of the manufacturer's order processing, or whether they will honor your request to ship the item by any particular method.


  • UPC: 783555294109 
  • Mfr's Part #: JZ263A